{"id":385,"date":"2023-02-26T18:15:41","date_gmt":"2023-02-26T18:15:41","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201a\/?page_id=385"},"modified":"2023-02-26T18:15:41","modified_gmt":"2023-02-26T18:15:41","slug":"journal-7","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse201a\/journal-7\/","title":{"rendered":"Journal #7"},"content":{"rendered":"\n<p>Assignment:<\/p>\n\n\n\n<p>Review the following ten photos through a cybersecurity human systems integration framework. Create a meme that explains what is going on in the individual&#8217;s or individuals&#8217; mind(s). Explain how your meme relates to Human Systems Integration.<\/p>\n\n\n\n<p>Meme 1 Source | <a href=\"https:\/\/unsplash.com\/photos\/mfB1B1s4sMc\">https:\/\/unsplash.com\/photos\/mfB1B1s4sMc<\/a><br>Meme 2 Source | <a href=\"https:\/\/unsplash.com\/photos\/gySMaocSdqs\">https:\/\/unsplash.com\/photos\/gySMaocSdqs<\/a><br>Meme 3 Source | <a href=\"https:\/\/unsplash.com\/photos\/ICTKcvnXx_8\">https:\/\/unsplash.com\/photos\/ICTKcvnXx_8<\/a><br>Meme 4 Source | <a href=\"https:\/\/unsplash.com\/photos\/Z3ownETsdNQ\">https:\/\/unsplash.com\/photos\/Z3ownETsdNQ<\/a><br>Meme 5 Source | <a href=\"https:\/\/unsplash.com\/photos\/5QgIuuBxKwM\">https:\/\/unsplash.com\/photos\/5QgIuuBxKwM<\/a><br>Meme 6 Source | <a href=\"https:\/\/unsplash.com\/photos\/R6dSBkz32B8\">https:\/\/unsplash.com\/photos\/R6dSBkz32B8<\/a><br>Meme 7 Source | <a href=\"https:\/\/unsplash.com\/photos\/BXiLSwwvqrY\">https:\/\/unsplash.com\/photos\/BXiLSwwvqrY<\/a><br>Meme 8 Source | <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Computer_user_icon.svg\">https:\/\/commons.wikimedia.org\/wiki\/File:Computer_user_icon.svg<\/a><br>Meme 9 Source | <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Summer_school_GLAM_giorno_1_1.jpg\">https:\/\/commons.wikimedia.org\/wiki\/File:Summer_school_GLAM_giorno_1_1.jpg<\/a><br>Meme 10 Source | <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:CellPhone_(16491636068).jpg\">https:\/\/commons.wikimedia.org\/wiki\/File:CellPhone_(16491636068).jpg<\/a><\/p>\n\n\n\n<p>Answer:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1620\" height=\"1080\" src=\"https:\/\/sites.wp.odu.edu\/cyse201a\/wp-content\/uploads\/sites\/31940\/2023\/02\/Meme1-1.jpg\" alt=\"\" class=\"wp-image-389\" \/><figcaption class=\"wp-element-caption\"><br>The meme above shows how elderly people are most likely to become a target to scamming. This is due to their lack of knowledge in cybersecurity and how to deal with such situations correctly.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"4752\" height=\"3168\" src=\"https:\/\/sites.wp.odu.edu\/cyse201a\/wp-content\/uploads\/sites\/31940\/2023\/02\/Meme2-1.jpg\" alt=\"\" class=\"wp-image-390\" \/><figcaption class=\"wp-element-caption\">The meme above shows how there are people who might not know that they have been scammed until it is too late.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"6597\" height=\"4398\" src=\"https:\/\/sites.wp.odu.edu\/cyse201a\/wp-content\/uploads\/sites\/31940\/2023\/02\/Meme3.jpg\" alt=\"\" class=\"wp-image-391\" \/><figcaption class=\"wp-element-caption\">The meme above shows how people will easily fall for obvious scams. In this example I used something you see on, for example, Instagram a lot where random people will text other people that they will double the money they sent them.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"4608\" height=\"3456\" src=\"https:\/\/sites.wp.odu.edu\/cyse201a\/wp-content\/uploads\/sites\/31940\/2023\/02\/Meme4.jpg\" alt=\"\" class=\"wp-image-392\" \/><figcaption class=\"wp-element-caption\">The meme above is supposed to show how employees will sometimes unknowingly lose the company money for falling for scams or not dealing with phishing emails correctly.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1620\" height=\"1080\" src=\"https:\/\/sites.wp.odu.edu\/cyse201a\/wp-content\/uploads\/sites\/31940\/2023\/02\/Meme5.jpg\" alt=\"\" class=\"wp-image-394\" \/><figcaption class=\"wp-element-caption\">The meme above is supposed to show how people will sometimes unknowingly download a virus when trying to pirate a movie for example. In companies employees could download a virus when clicking on an unknown link sent in an unsuspecting e-mail.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/cyse201a\/wp-content\/uploads\/sites\/31940\/2023\/02\/Meme6.jpg\" alt=\"\" class=\"wp-image-395\" width=\"840\" height=\"1120\" \/><figcaption class=\"wp-element-caption\">The meme above is supposed to show how people can be led to believe that they have one something amazing and all they need to do is click the link. The link however, leads to an unknown website which would download a virus onto your device.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1080\" height=\"1620\" src=\"https:\/\/sites.wp.odu.edu\/cyse201a\/wp-content\/uploads\/sites\/31940\/2023\/02\/Meme7.jpg\" alt=\"\" class=\"wp-image-397\" \/><figcaption class=\"wp-element-caption\">The meme above is supposed to show how technology has made it easier to stalk other people. This has caused a lot of people to fall victim to stalking or bullying for example.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"565\" src=\"https:\/\/sites.wp.odu.edu\/cyse201a\/wp-content\/uploads\/sites\/31940\/2023\/02\/Meme8.jpg\" alt=\"\" class=\"wp-image-398\" \/><figcaption class=\"wp-element-caption\">The meme above is once again supposed to show how easily people can fall for scams. In this case they are being promised $1,000,000 to help a prince but as we all know now that is not actually the case. The person giving his information away will lose his money and will not get the $1,000,000 as promised.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"506\" src=\"https:\/\/sites.wp.odu.edu\/cyse201a\/wp-content\/uploads\/sites\/31940\/2023\/02\/Meme9.jpg\" alt=\"\" class=\"wp-image-399\" \/><figcaption class=\"wp-element-caption\">The meme above is supposed to show how easily people can be coerced into giving away critical information that belongs to a certain company. In this example sensitive information of a company is being given out in exchange for an in game currency.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"532\" src=\"https:\/\/sites.wp.odu.edu\/cyse201a\/wp-content\/uploads\/sites\/31940\/2023\/02\/Meme10.jpg\" alt=\"\" class=\"wp-image-400\" \/><figcaption class=\"wp-element-caption\">This meme is supposed to show how with the advancements made in technology, more dangers have occurred from them. In this case a young man is stalking a young woman and is taking pictures of her. Due to the phone being small, the victim doe not seem to notice him. This is dangerous because it can lead to unwanted pictures that the victim is unaware of.<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Assignment: Review the following ten photos through a cybersecurity human systems integration framework. Create a meme that explains what is going on in the individual&#8217;s or individuals&#8217; mind(s). Explain how your meme relates to Human Systems Integration. Meme 1 Source | https:\/\/unsplash.com\/photos\/mfB1B1s4sMcMeme 2 Source | https:\/\/unsplash.com\/photos\/gySMaocSdqsMeme 3 Source | https:\/\/unsplash.com\/photos\/ICTKcvnXx_8Meme 4 Source | https:\/\/unsplash.com\/photos\/Z3ownETsdNQMeme 5&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201a\/journal-7\/\">Read More<\/a><\/div>\n","protected":false},"author":25846,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201a\/wp-json\/wp\/v2\/pages\/385"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201a\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201a\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201a\/wp-json\/wp\/v2\/users\/25846"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201a\/wp-json\/wp\/v2\/comments?post=385"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse201a\/wp-json\/wp\/v2\/pages\/385\/revisions"}],"predecessor-version":[{"id":401,"href":"https:\/\/sites.wp.odu.edu\/cyse201a\/wp-json\/wp\/v2\/pages\/385\/revisions\/401"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201a\/wp-json\/wp\/v2\/media?parent=385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}